Introduction to Terraform with ACI – Part 2

Introduction to Terraform with ACI – Part 2

If you haven’t already seen Part 1 of this blog series, please have a read through. This section will cover ACI + Terraform, and we’ll include a couple of new topics – Terraform importing and data resources.  ​​​​​​​ Introduction to Terraform Terraform and ACI​​​​​​​ Explanation of the Terraform configuration files Terraform Remote State and Team Collaboration Terraform Providers – How are they built? Code Example https://github.com/conmurphy/intro-to-terraform-and-aci Lab Infrastructure You may already have your own ACI…

Read More

Nvidia launches program for certified AI servers

Nvidia launches program for certified AI servers

Nvidia is offering a certification program to steer customers and partners to buy GPU servers specifically tailored for artificial intelligence (AI) workloads from top-tier OEMs and ODMs. The program, called Nvidia-Certified Systems, is similar to those offered by Intel and AMD. It tells customers that these servers with these configurations are best optimized for running AI workloads at peak performance and in large-scale deployments. Nvidia kicked off the program with 14 certified GPU servers from…

Read More

Will carriers use 5G to provide edge services?

Will carriers use 5G to provide edge services?

US mobile carriers see an opportunity to broaden their role in the enterprise marketplace as the rush to deploy 5G continues, but it’s unclear whether their strategy will be sufficient to achieve that goal, according to industry analysts. Verizon, AT&T and T-Mobile are cornerstones of America’s Internet infrastructure, but their role has been largely restricted to data transport for most of their history. The provide data pipelines, but efforts to monetize their networks beyond the…

Read More

Are Openness and Security Both Possible in a 5G World? – Cisco Blogs

Are Openness and Security Both Possible in a 5G World? – Cisco Blogs

This week, I had the opportunity to speak at a National Telecommunications and Information Administration (NTIA) industry listening session on the U.S. federal government’s strategy for 5G policy. The agency’s consistent commitment to working with private sector stakeholders allows for thoughtful exploration of knotty questions, like whether and how a pivot to open 5G network architectures impacts the security of those networks. The thrust of my message today was that we believe that well-designed open…

Read More

Ethernet innovation pits power against speed

Ethernet innovation pits power against speed

While the move to 400G Ethernet has so far been a largely hyperscaler and telco-network event, the ambition for those users, as well as data-center customers is ultimately to  move to at least 800Gbps and possibly 1.6Tbps. And while 800Gbps seems to be a solid goal for Ethernet networking visionaries, the challenges—such as the optics, power, and architecture required to make the next speed leap—seem formidable. The need for increased speed in data centers and…

Read More

Cisco Collaboration Flex Plan Now Includes an all New Comprehensive and Cost-Effective Offer for Education

Cisco Collaboration Flex Plan Now Includes an all New Comprehensive and Cost-Effective Offer for Education

At Cisco we are pleased to kick off 2021 with an exciting update to the Cisco Collaboration Flex Plan that continues our mission to drive experiences that are 10x better than in-person interactions, help organizations collaborate seamlessly, and transform employee and customer experiences to power an inclusive future for all. Building off our last blog where we discussed Cisco Calling Plans and better together Security + Collaboration offers, I am pleased to share that the…

Read More

Data Privacy Day: Advice and insights from Security Engineer & Networking Academy alumnus – Cisco Blogs

Data Privacy Day: Advice and insights from Security Engineer & Networking Academy alumnus – Cisco Blogs

Every day, more than 2.5 quintillion bytes of data are created. A number so large our minds can’t comprehend it. In 2020, every minute, 41.6 million WhatsApp messages were sent, 1.4 million video and voice calls were made, 69,444 people applied for jobs on LinkedIn, and TikTok was downloaded 2,704 times – each transaction generating different types of data. To add another layer of complexity, there are projected to be 35 billion IoT devices worldwide in…

Read More

Trusted Internet Connection: A Renewed Focus on Resiliency

Trusted Internet Connection: A Renewed Focus on Resiliency

Recently, the need for government organizations to enable employees to work from home and deliver digital services from remote locations have pushed traditional network access to increasingly more touch points. This new reality as well as the accelerated adoption of technologies like cloud-based applications and the Internet of Things (IoT) are widening the threat surface for cyber-attacks on government IT infrastructure, magnifying the already complex cybersecurity landscape. Due to this paradigm shift in how technologies…

Read More

Time to Refresh: Leapfrogging Security with Cisco SecureX – Cisco Blogs

Time to Refresh: Leapfrogging Security with Cisco SecureX – Cisco Blogs

What is the first thing that comes to your mind when you hear the words “tech refresh?” For example, do you think about an antiquated technology that is not integrated needing a fresh lease of life? Or is it just getting new technology to solve a problem that the predecessor failed at solving?  Or is it part of a much larger attempt to transform security to become an enabler for business transformation? Answering this simple…

Read More

Leapfrogging with Smart Tech Refresh – Cisco Blogs

Time to Refresh: Leapfrogging Security with Cisco SecureX – Cisco Blogs

What is the first thing that comes to your mind when you hear the words “tech refresh?” For example, do you think about an antiquated technology that is not integrated needing a fresh lease of life? Or is it just getting new technology to solve a problem that the predecessor failed at solving?  Or is it part of a much larger attempt to transform security to become an enabler for business transformation? Answering this simple…

Read More
1 1,306 1,307 1,308 1,309 1,310 1,361